Reverse.

Decrypting APT33’s Dropshot Malware with Radare2 and Cutter – Part 2.

Continued analysis of APT33’s Dropshot malware. Automating string decryption with r2pipe, resource extraction, and completing the malware analysis with Cutter.

‘Decrypting APT33’s Dropshot Malware with Radare2 and Cutter – Part 1’.

Analyzing APT33’s Dropshot (StoneDrill) malware using Cutter and radare2. String decryption, function analysis, and Jupyter integration for malware research.

Reversing a Self-Modifying Binary with radare2.

Analyzing a packed, self-modifying binary with radare2. Covers UPX-like packers, runtime unpacking, ESIL emulation, and debugging packed executables.

A journey into Radare 2 – Part 2: Exploitation.

Part 2 of the radare2 tutorial series. Covers exploitation, buffer overflows, ROP chains, and writing exploits with radare2.

A journey into Radare 2 – Part 1: Simple crackme.

Step-by-step tutorial for learning radare2 by solving a simple crackme. Covers installation, basic commands, visual mode, analysis, and debugging.

[Pragyan CTF] Roller Coaster Ride.

[H4CK1T 2016] Crypt00perator – Ethiopia Writeup.

[H4CK1T 2016] PhParanoid – Malaysia Writeup.

[CSAW 2016] Gametime Writeup.

[CSAW 2016] Key Writeup.

[TWCTF-2016: Reverse] Reverse Box Writeup.